Show the conceptual design of the relational database

Assignment Help Computer Engineering
Reference no: EM133359931

Case Study: A bridal company called Lilacs would like a database for their clients and the weddings they coordinate. The weddings have the following details: wedding date, maximum budget, start time, an automatically generated ID and the marriage officer that will preside over the wedding. Lilacs does all types of weddings such as civil ceremonies, religious weddings, non-denominational, out of town, and themed weddings. In more detail, they would like to track the theme name and descriptions of "themed" weddings and if the wedding is an "out of town" wedding they would like to track the name of the hotel that will house the guests. It is possible for Lilacs to have a themed out of town wedding, as well as an in town un-themed wedding. Each wedding is catered by a caterer that has a caterer-id, name, various phone numbers and an email address. The caterer can be re-used to cater for several weddings, even if more than one wedding is on the same day. Lilacs would like all weddings to indicate the caterer before the wedding is booked. Each wedding occurs at a venue and hence details such as the name of the venue, capacity and address (street, town, city) is required. Bridal Party's information is also important. Each bridal party has a groom, groomsmen, bride and bridesmaids. Each Bridal Party member is uniquely identified by an email, and Lilacs would also like to store their name (firstname, lastname), gender, dob (in order to calculate age), address and mobile number. A bridal party member can be involved in other weddings; however, whenever any bridal party member participates in a wedding, Lilacs would like to know what position they played. Separately, no wedding should be booked unless one of the bridal party members acts as the owner of the wedding or main contact. Lilacs would also like to track their employees, such as name, employment date, address and job description. Whenever a bridal party is involved in a wedding, Lilacs would like to know the lead wedding planner who is responsible for the wedding as well as the employee assigned to the bridal party to assist in their dress preparation for the wedding such as their fitting and makeup etc.

Question:

Create an Entity Relationship Diagram (ERD) to show the conceptual design of the relational database. Draw an Entity Relationship Diagram for the scenario above

 

Reference no: EM133359931

Questions Cloud

Vessel for employee feedback and performance notifications : The Future Vision case study in your book discusses using a phone app as a vessel for employee feedback and performance notifications.
Socially responsible efforts : Socially Responsible Efforts-Describe each company's efforts to promote ethical and social good.
Find a recent news articles about a implementing windows : Using a library with current periodicals, find a recent news articles about a implementing Windows server active directory. Write a two- to three-page review
Authors approach of determining tradeoffs : What aspects of critical thinking would enhance the authors' approach of determining tradeoffs
Show the conceptual design of the relational database : Create an Entity Relationship Diagram (ERD) to show the conceptual design of the relational database. Draw an Entity Relationship Diagram for the scenario above
What is the form of the anti-dilution provision : What is the form of the anti-dilution provision for the senior preferred stock(partial, full, or weighted average ratchet)? b.Does the Company's senior
Defines the objective of consolidated financial statements : ACCT 470 Bellevue College defines the objective of consolidated financial statements. What is that objective and who is the primary audience of consolidated
What about church history have emerged in your mind : What questions about church history have emerged in your mind? What do you hope to learn more about in this class?
Explain the data modeling using entity-relationship model : Explain the data modeling using entity-relationship model with one example. In the answer, include an image of ER Diagram shoing at least 3 entities

Reviews

Write a Review

Computer Engineering Questions & Answers

  Difference between passive and active security threats

What is the difference between passive and active security threats? List and briefly define categories of passive and active security attacks.

  What was the human reason for encoding this information

What kind of encoding would this be and what was the human reason for encoding this information?

  Define disadvantages in information technology

Management Information Systems uses, advantages and disadvantages in information technology and as an IT professional, how we apply these concepts.

  What operating system and edition do the computers

What operating system and edition do the computers in this classroom run? Is the operating system used in the classroom considered to be a network operating

  Demonstrate debugging and testing skills

Identify and use the correct syntax of a common programming language - Explain the importance of programming style concepts (documentation, mnemonic names)

  Health insurance portability and accountability act

Health Insurance Portability and Accountability Act, Research the following laws that relate to computer crime. Write a 12-16 page paper discussing the role they play in computer crime. Be sure to research and document cases to support each law and..

  Multicast routing paradigm

The data-driven multicast routing paradigm works best on the local networks which have low delay and excess capacity, however the demand driven paradigm works best in the wide are environment which has limited capacity and higher delay.

  CSE 300 Cybersecurity Engineering Program Assignment

CSE 300 Cybersecurity Engineering Program Assignment Help and Solution, Abu Dhabi University - Assessment Writing Service

  Explain how the public and private key pair works

Explain how the public and private key pair works. How does PKI can be used in an online contract to support Authenticity and Nonrepudiation. Explain how the.

  Discuss the use of cloud backup strategies

Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well?

  Discuss various models used to help measure the value added

In 175 words or more discuss the various models that are commonly used to help measure the value added to a business by information systems.

  Supply the value of v.size()

Give the value of v.size() after executing each of the following statements: (Be sure to include the code used to execute the statements. One program will be fine to execute all statements, no require to write multiple programs.)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd